Set3 CompTIA Security+ Sample Questions: Cryptography

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 605,175
Questions: 23 | Attempts: 7,096

SettingsSettingsSettings
Set3 CompTIA Security+ Sample Questions: Cryptography - Quiz

This is Set 3 of 4 of practice questions for CompTIA Security+ exam. This set covers the exam objective Cryptography. You can take these Security+ sample questions for practice or take it as a topic wise practice exam. Read the questions carefully and answer. So, let's try out the quiz. All the best!
Feedback and comments are welcome.


Questions and Answers
  • 1. 

    Which of the following is the latest version of SHA?

    • A.

      SHA-1

    • B.

      SHA-4.1

    • C.

      SHA-4

    • D.

      None of the above

    Correct Answer
    D. None of the above
    Explanation
    The correct answer is None of the above. The latest version of the Secure Hash Algorithm (SHA) is SHA-3, which was chosen in 2012 after a public competition among non-NSA designers. It supports the same hash lengths as SHA-2, and its internal structure differs significantly from the rest of the SHA family. As of now, there is no SHA-4 or SHA-4.1.

    Rate this question:

  • 2. 

    Choose the odd one out.

    • A.

      RC5

    • B.

      Blowfish

    • C.

      MAC

    • D.

      ECC

    Correct Answer
    C. MAC
    Explanation
    RC5, ECC and Blowfish are encryption systems. MAC is a type of hardware address.

    Rate this question:

  • 3. 

    Which of the following is not used by certificate system?

    • A.

      Public key

    • B.

      Private key

    • C.

      Session key

    • D.

      Session ID

    Correct Answer
    D. Session ID
    Explanation
    The Certificate security system uses the basic logic of Public/Private key pairs in combination of session ID. There is no key such as session key.

    Rate this question:

  • 4. 

    ECC is the encryption system used in cellular devices. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    ECC is the encryption system used in cellular devices.

    Rate this question:

  • 5. 

    Cryptography is an essential in encapsulation protocols. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Cryptography is essential in encryption protocols.

    Rate this question:

  • 6. 

    Which of the following components decides how secure an encryption protocol is?

    • A.

      The number of keys used by the encryption protocol

    • B.

      The number of keys used by the algorithm

    • C.

      Number of bits used for encryption by the algorithm

    • D.

      None of the above

    Correct Answer
    C. Number of bits used for encryption by the algorithm
    Explanation
    The number of bits used for encryption by the algorithm decides how secure that encryption type will be.

    Rate this question:

  • 7. 

    Cryptanalysis is nothing but pattern finding T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Pattern finding is a part of cryptanalysis it does not form the entire process of cryptanalysis.

    Rate this question:

  • 8. 

    In asymmetric-key encryption, one key will be used for encryption and another will be used for decryption to provide maximum security. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    In asymmetric-key encryption, one key will be used for encryption as well as decryption.

    Rate this question:

  • 9. 

    Which of the following is true regarding Caesar�s key value 3?

    • A.

      It uses an offset value of 3 for sliding alphabets

    • B.

      There is a difference of 3 between the alphabets when the sliding action occurs

    • C.

      It uses 3 keys for encryption

    • D.

      None of the above

    Correct Answer
    A. It uses an offset value of 3 for sliding alphabets
    Explanation
    According to Caesar�s Cipher key value of 3, you would be sliding up the alphabetical value by 3. The difference would be 2 and not 3. If A has to be represented by Caesar�s key value 3 system, it would be represented as C.

    Rate this question:

  • 10. 

    Which of the following is an advantage of using conventional encryption?

    • A.

      It is the most secure

    • B.

      It is very fast

    • C.

      It is economical

    • D.

      None of the above

    Correct Answer
    B. It is very fast
    Explanation
    When conventional encryption is used for stored data rather than the data being transmitted, encryption and decryption process can be very fast.

    Rate this question:

  • 11. 

    The concept of public key cryptography was introduced by Julius Caesar. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The issues with key distribution faced by conventional encryption, was overcome by the Public-key cryptography concepts introduced by Diffie-Hellman.

    Rate this question:

  • 12. 

    Which of the following is true?

    • A.

      PK cryptography is a very complex and nearly impossible setup

    • B.

      You need just one single key for encrypting as well as decrypting in PK cryptography

    • C.

      Public key can only encrypt and private key can only decrypt

    • D.

      None of the above

    Correct Answer
    D. None of the above
    Explanation
    PK cryptography, or public-key cryptography, is not necessarily very complex and nearly impossible to set up. Additionally, in public-key cryptography, you use one key for encryption (the public key) and a different key for decryption (the private key). Therefore, the statement "You need just one single key for encrypting as well as decrypting in PK cryptography" is incorrect. Finally, both the public key and private key have specific functions: the public key is used for encryption, and the private key is used for decryption. Therefore, the statement "Public key can only encrypt and private key can only decrypt" is also incorrect.

    Rate this question:

  • 13. 

    The higher the number of bits, more secure is the key. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Keys are measured by bits. Higher the value of keys used, more reliable will be the encryption system.

    Rate this question:

  • 14. 

    A digital signature is used for which of the following?

    • A.

      Encrypting

    • B.

      Identifying

    • C.

      Encapsulating

    • D.

      None of the above

    Correct Answer(s)
    A. Encrypting
    B. Identifying
    Explanation
    A digital signature is used to establish Identity of the communicating user as well as encrypting in specific cases.

    Rate this question:

  • 15. 

    Which of the following does cryptography use to encrypt?

    • A.

      Hash

    • B.

      Digital signature

    • C.

      Token

    • D.

      None of the above

    Correct Answer
    A. Hash
    Explanation
    When cryptography uses hash function on a plain text, a fixed length of data called the message digest is generated. This message digest helps to preserve the data integrity by generating a digest value when the data is transmitted.

    Rate this question:

  • 16. 

    Even today only upto 20% of critical information being transmitted is really secure. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A lot of information being transmitted through the Internet is still not entirely secure. Only 15-20% of data transmission is completely secure.

    Rate this question:

  • 17. 

    PKI uses which of the following to ascertain identity?

    • A.

      Certificate

    • B.

      Digital signature

    • C.

      Hand print

    • D.

      None of the above

    Correct Answer
    A. Certificate
    Explanation
    Digital signature is ideal for an Intranet or LAN scenario. Handprint is used in Biometrics. PKI uses certificates for establishing Identity.

    Rate this question:

  • 18. 

    PKI requires skilled and continuous maintenance on the network. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    PKI when implemented on a network will require a skilled person to oversee its maintenance in the long run.

    Rate this question:

  • 19. 

    Traditional PKI uses self assembly process to maintain security. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Traditional PKI us incapable of self assembly, which is a draw back with PKI.

    Rate this question:

  • 20. 

    Which of the following is an improvement over PKI?

    • A.

      Certificates

    • B.

      SMSA

    • C.

      Token

    • D.

      None of the above

    Correct Answer
    B. SMSA
    Explanation
    SMSA is an improvement over PKI where implementation maintenance and administration is concerned. This is because SMSA is capable of self assembly.

    Rate this question:

  • 21. 

    Which of the following statements is true?

    • A.

      A private key may be derived from a public key

    • B.

      Given a public key it is very difficult to derive the private key

    • C.

      A session ID is used to create a public key

    • D.

      None of the above

    Correct Answer
    B. Given a public key it is very difficult to derive the private key
    Explanation
    Given a public key it is extremely difficult to derive a private key from it. A session ID is used to provide security to a key being transmitted and is not used to generate any key.

    Rate this question:

  • 22. 

    Which of the following is an improvement over the scheme used in digital signatures?

    • A.

      Token

    • B.

      One-way hash functions

    • C.

      Cryptanalysis

    • D.

      None of the above

    Correct Answer
    B. One-way hash functions
    Explanation
    One-way hash functions generate significantly less data and are much more.

    Rate this question:

  • 23. 

    Which of the following is used to sign the certificate created by the CA?

    • A.

      CA�s digital signature

    • B.

      CA�s private key

    • C.

      CA�s certificate

    • D.

      None of the above

    Correct Answer
    B. CA�s private key
    Explanation
    The certificate generated by the CA is signed using the CA�s private key.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 07, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 18, 2006
    Quiz Created by
    Vaibhav Agarwal
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.